|Publication number||US7928846 B2|
|Application number||US 12/133,607|
|Publication date||Apr 19, 2011|
|Filing date||Jun 5, 2008|
|Priority date||Jun 5, 2008|
|Also published as||US20090303020|
|Publication number||12133607, 133607, US 7928846 B2, US 7928846B2, US-B2-7928846, US7928846 B2, US7928846B2|
|Inventors||Kenneth L. Greenlee, Christian L. Hunt, Steven M. Miller, Anne I. Ryan|
|Original Assignee||International Business Machines Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (22), Non-Patent Citations (6), Referenced by (2), Classifications (9), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates to the field of data tag devices, and more particularly to active data tag devices which store time-sensitive data.
Data tag devices are in widespread use and are used to associate information with a particular item, or object. A data tag may be a passive device which can only respond to queries from tag readers, and which receives power to provide the response from the query signal itself. Alternatively a data tag may be an active device, having its own power source allowing it occasionally broadcast an unsolicited beacon signal. The beacon signals are typically transmitted periodically, or in response to some event or other stimulus occurring.
Tags are used in a variety of industries including retail, transportation, medical/healthcare, and security, to name several. They are configured, accordingly, in a variety of form factors, as dictated by the particular application. Tags can be manufactured at such a low cost that they can be considered disposable in many applications. However, once a given tag's purpose has been fulfilled, it will persist, storing its data in a retrievable format indefinitely. Even so called “active” tags, which incorporate a power source, may remain viable for years after being initially deployed because, unless it is receiving or transmitting, a tag uses virtually no power.
Tags are typically concealed in packing materials, containers, products, and even integrated into these items. When these items are disposed of, the information in the tags may be obtained by third parties. This is particularly true of active tag devices since their beacons signal may be received without any ready query or solicitation. It is anticipated that tag usage will increase.
Retailers can disable tags on items purchased at the point of sale. Disabling these tags adds an additional process at the point of sale, which is typically undesirable since it adds a cost in both equipment and time necessary to deactivate each tag. Furthermore, completely deactivating a tag at a point of sale may be undesirable for other reasons, such as warranty and return tracking, for example.
Another means for deactivating tags is for the consumer to use a so-called RFID zapper, which attempts to overload the circuits of the tag and destroy it as a result. A consumer may also simply destroy a tag to dispose of it. Of course, these methods assume the consumer both knows of the existence of the tag, and that the tag can reasonably be removed from the item with which it is associated.
Therefore there exists a need for a way to disable data tags to reduce the possibility that the tag information will be acquired by third parties.
The invention provides in one embodiment a method of triggering self-expiration of a data tag device commenced upon operating the data tag device in an active mode wherein the data tag device occasionally transmits a beacon and provides access to tag data. Upon detecting the occurrence of an expiration event while operating in the active mode, the method further includes disabling a power source of the data tag device upon detecting the expiration event, thereby preventing subsequent operation in the active mode.
The invention, in another embodiment, provides a data tag device having including tag circuitry. The tag circuitry comprises a machine readable memory in which tag data is stored. The tag circuitry further includes a communication interface configured to facilitate communication of the tag data with external devices. Additionally the tag circuitry includes a controller operably coupled to the communication interface and the machine readable memory. To facilitate active mode operation the tag device is provided with a battery which is operably coupled to the tag circuitry, and configured to provide power to the tag circuitry when the data tag device is operated in an active mode. To disable active mode operation, the tag device further includes a battery disabling circuit coupled to the battery, and which is responsive to an expiration event. The battery disabling circuit is configured to disable the battery upon occurrence of the expiration event, thereby changing the battery from an enabled state to a disabled state. The controller is configured to operate in the active mode while the battery is in the enabled state, and ceases operation in the active mode when the battery is in the disabled state.
In a further embodiment of the invention, the invention is implemented in a computer program product. Machine readable code stored on the computer program product will cause a data tag device to operate the data tag device in an active mode. While in the active mode, the data tag device occasionally transmits a beacon and provides access to tag data. The code will cause the tag to detect the occurrence of an expiration event while operating the data tag device in the active mode, and disable the power source upon detecting the expiration. Once the power source is disabled, the data tag device is prevented from subsequent active mode operation.
As will be appreciated by one skilled in the art, the present invention may be embodied as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, the present invention may take the form of a computer program product on a computer-usable storage medium having computer-usable program code embodied in the medium. In a preferred embodiment, the invention is implemented at least in part in software, which includes but is not limited to firmware, resident software, microcode, etc.
Furthermore, the invention may be embodied as a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-usable medium may include a propagated data signal with the computer-usable program code embodied therewith, either in baseband or as part of a carrier wave. The computer usable program code may be transmitted using any appropriate medium, including but not limited to the Internet, wireline, optical fiber cable, RF, etc.
Any suitable computer usable or computer readable medium may be utilized. The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory, a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD. Other computer-readable medium can include a transmission media, such as those supporting the Internet, an intranet, a personal area network (PAN), or a magnetic storage device. Transmission media can include an electrical connection having one or more wires, an optical fiber, an optical storage device, and a defined segment of the electromagnet spectrum through which digitally encoded content is wirelessly conveyed using a carrier wave.
Note that the computer-usable or computer-readable medium can even include paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
Computer program code for carrying out operations of the present invention may be written in an object oriented programming language such as Java, Smalltalk, C++ or the like. However, the computer program code for carrying out operations of the present invention may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
The present invention is described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The invention addresses the problem of data persistence, and particularly data being transmitted by active data tags, by disabling the data tag to prevent at least active operation. According to the invention, a data tag operating in an active mode experiences an expiration event. Upon occurrence of the expiration event, the power source of the data tag is disabled, thereby preventing subsequent operation in an active mode.
The controller is coupled to an interface element 104 which provides a means of communicating with other devices. The interface element includes a medium termination 112, such as an antenna for wireless communication. Other terminators may be used, such as, for example, an electrical connector, although most tag devices operate wirelessly. A communication circuit 114 is coupled to the termination 112, and converts signals received via the termination to a form usable by the controller 102. Furthermore, the communication circuit receives data signals from the controller and converts them into a form for transmission over the media 120 via the termination 112. In one embodiment of the invention the communication circuit 114 is a radio frequency (RF) transceiver which coverts received radio frequency signals into data signals, and vice-versa, as is known.
The controller is further coupled to a memory element 106, which contains at least a tag data section 116 for storing tag data. The memory element is a machine readable storage medium. The memory element may also contain additional information, such as, for example, a unique tag identifier 117, and control code 118. The control code may include instruction code for operating the controller, as well as operational parameters. Information which may be stored may include an initiation value, an expiration value, or both, to be used by the controller and, in one embodiment of the invention, an event generator 108 in generating an expiration event.
The event generator may be part of the controller, as indicated by the dashed-line box around both the controller 102 and the event generator 108, or it may be a separate subsystem which is interface to the controller. The event generator may be used to generate an expiration event at the end of the desired period of active mode operation. That is, an active period is selected for the active mode of the tag, either at the time of manufacture, or as a result of programming thereafter, and the event generator produces an expiration event upon the passing of the active period. The expiration event is recognized by the controller, and triggers a battery disabling process, resulting in the data tag becoming unable to operate in an active mode. Once the active mode has expired, the tag will no longer transmit unsolicited beacons, and may erase or otherwise disable access to some or all of the tag data. The event generator may use an oscillator 122 or other clock source to measure or count time. The event generator may include, for example, a clock or counter.
To facilitate stable operation in the active mode, the data tag device further includes a power source 110, which may be, for example, an electrochemical cell or battery element. The power source is operably coupled to the tag circuitry, which may further be coupled to a battery disabling circuit 111. In one embodiment of the invention, the battery disable circuit disables the battery in response to the expiration event. The expiration event may occur at the event generator 108, which operates as a clock, or a separate clock source 113 may be used directly coupled to the battery disable circuit. The use of a clock allows generation of the expiration event internal to the tag. It is contemplated that the expiration event may be generated in response to an external source as well, such as, for example, the reception of a “kill” command from an external source, such as a tag reader. In the case of the tag receiving the kill command the event generator would include the code necessary for recognizing the kill command at the control element. In turn, the control element may provide a disable signal to the battery disable circuit, causing the battery disable circuit to disable the battery. By disabling the battery, the battery is changed from an enabled state where it can provide power to the tag circuitry, to a disabled state where it is prevented from providing power to the tag circuitry. It should be noted that the use of a battery disable circuit provides one means of disabling the power source. Alternatives to using a battery disable circuit include transmitting a signal to use up battery charge.
According to the invention, the battery is to be disabled upon the occurrence of an expiration event. In one embodiment of the invention it is contemplated that a clock circuit or equivalent may be used to measure a period of time in which the tag is to operate in the active mode, and upon expiration of the desired period of time, the tag ceases active operation.
Once the tag is initialized, the tag then, among other processes it may perform, continues checking for an expiration event (512, 514). For example, the tag may compare a present clock value with an expiration value. The comparison may be a performed, for example, by the controller, or it may be performed by logic gates, or any other suitable means of comparing. While the clock value has not reached the expiration value, the process keeps repeating. Alternatively, or in addition to the clock, the tag may check to see if a kill command has been received (509). Once the requisite expiration event has been detected, the battery is disabled (516) by the selected means, and the method then terminates (518). In addition to disabling the battery, the tag may also erase or wipe some or all of the tag data. Upon the battery being disabled, the tag will no longer function in an active mode, unless repaired or, for example, a fuse is replaced. Subsequent to the expiration event, however, the tag may continue operating in a passive mode, and allow access to the tag data in response to appropriate queries. While operating in the passive mode, access to at least a portion of the tag data may be disabled.
Those skilled in the art will realize that the invention may be implemented in the form of a computer program product. Machine readable code stored on the computer program product will cause a data tag device to operate the data tag device in an active mode. While in the active mode, the data tag device occasionally transmits a beacon and provides access to tag data. The code will cause the tag to detect the occurrence of an expiration event while operating the data tag device in the active mode, and disable the power source upon detecting the expiration. Once the power source is disabled, the data tag device is prevented from subsequent active mode operation.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5573611||May 30, 1995||Nov 12, 1996||Bridgestone/Firestone, Inc.||Method of monitoring conditions of vehicle tires and tires containing a monitoring device therein|
|US6025780 *||Jul 25, 1997||Feb 15, 2000||Checkpoint Systems, Inc.||RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system|
|US6741523 *||May 15, 2000||May 25, 2004||3M Innovative Properties Company||Microstructured time dependent indicators|
|US7161476 *||Jul 26, 2001||Jan 9, 2007||Bridgestone Firestone North American Tire, Llc||Electronic tire management system|
|US7212955 *||Jan 14, 2004||May 1, 2007||Hewlett-Packard Development Company, L.P.||Consumer product status monitoring|
|US7321307 *||Feb 22, 2005||Jan 22, 2008||Sun Microsystems, Inc.||Chemical time modification of an object|
|US7345586 *||Jun 29, 2005||Mar 18, 2008||Motorola Inc||System and method for transferring data to an electronic device|
|US7375635||Nov 23, 2005||May 20, 2008||Paxar Americas, Inc.||Deactivatable RFID labels and tags and methods of making same|
|US7411503 *||Sep 26, 2006||Aug 12, 2008||Alien Technology||System and method for disabling data on radio frequency identification tags|
|US7548164 *||Feb 2, 2006||Jun 16, 2009||Atmel Corporation||Means to deactivate a contactless device|
|US20050116826 *||Dec 1, 2004||Jun 2, 2005||Shalom Wertsebrger||Method for Partial Disablement of Radio Frequency Identification Tags and Tags for Use Therewith|
|US20050127157||Dec 15, 2003||Jun 16, 2005||Pitney Bowes Incorporated||System and method for determining and reporting whether a mail piece has been opened by a recipient|
|US20060187046 *||Feb 22, 2005||Aug 24, 2006||Kramer Bradley A||System and method for killing a RFID tag|
|US20070018832 *||Jul 19, 2006||Jan 25, 2007||Precision Dynamics Corporation||Semi-active rfid tag and related processes|
|US20080084309 *||Oct 5, 2006||Apr 10, 2008||Joshua Posamentier||Revealable RFID devices|
|US20080117050 *||May 25, 2007||May 22, 2008||Industrial Technology Research Institute||Wireless radio frequency identification system and method for controlling the active radio frequency identification tag|
|US20080157974 *||Dec 27, 2006||Jul 3, 2008||Gregory Jensen Boss||Method of disabling and enabling radio frequency identification after a predefined time period or event|
|US20090040878 *||Aug 10, 2007||Feb 12, 2009||Joseph Domes||Invitation card with built-in countdown feature|
|US20090276790||Apr 30, 2008||Nov 5, 2009||International Business Machines Corporation||Method and apparatus for triggering expiration of a data tag device|
|US20090303017||Jun 6, 2008||Dec 10, 2009||International Business Machines Corporation||Method and apparatus for disabling a data tag device|
|US20090303049||Jun 5, 2008||Dec 10, 2009||International Business Machines Corporation||Method and apparatus for self-expiration of a passive data tag device|
|US20090303061||Jun 6, 2008||Dec 10, 2009||International Business Machines Corporation||Method and apparatus for disabling an active data tag device|
|1||"Problems With RFID", Technovelgy, LLC, viewed Feb. 5, 2008.|
|2||Campbell, A., "Clippable RFID Tags to Protect Consumers", RFID Weblog, Jan. 2006.|
|3||Karjoth, G., et al., "Disabling RFID Tags with Visual Confirmation: Clipped Tags are Silenced", IBM Research Report, Aug. 2005.|
|4||Schwartz, E., "IBM Clips RFID's Wings to Stop Private Data's Flight", Computerworld, Nov. 2006.|
|5||US Pub. No. 20090303049, Non-Final Office Action, Jun. 8, 2010.|
|6||US Pub. No. 20090303061, Notice of Allowance, Aug. 6, 2010.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8957774 *||Feb 22, 2011||Feb 17, 2015||Vivian B. Goldblatt||Concealed personal alarm and method|
|US20120212339 *||Feb 22, 2011||Aug 23, 2012||Goldblatt Vivian B||Concealed personal alarm and method|
|U.S. Classification||340/572.3, 368/107|
|International Classification||G04F8/00, G08B13/14, G04F10/00|
|Cooperative Classification||G06K19/0723, G06K19/0705|
|European Classification||G06K19/07T, G06K19/07A2E|
|Jun 5, 2008||AS||Assignment|
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GREENLEE, KENNETH L.;HUNT, CHRISTIAN L.;MILLER, STEVEN M.;AND OTHERS;REEL/FRAME:021052/0249;SIGNING DATES FROM 20080527 TO 20080603
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GREENLEE, KENNETH L.;HUNT, CHRISTIAN L.;MILLER, STEVEN M.;AND OTHERS;SIGNING DATES FROM 20080527 TO 20080603;REEL/FRAME:021052/0249
|Oct 10, 2014||FPAY||Fee payment|
Year of fee payment: 4